Journal of System Simulation ›› 2015, Vol. 27 ›› Issue (6): 1338-1347.doi: 10.16182/j.cnki.joss.2015.06.027

Previous Articles     Next Articles

New Identify Based Proxy Signature Scheme

Hong Xiaojing1, Wang Bin2   

  1. 1. Department of Information Engineering, Jianghai Polytechnic College, Yangzhou 225101, China;
    2. Information Engineering College, Yangzhou University, Yangzhou 225127, China
  • Received:2014-06-09 Revised:2014-06-30 Online:2015-06-08 Published:2021-01-15

Abstract: Proxy signature schemes allow a proxy signer to generate proxy signatures on behalf of an original signer. Mambo, et ah first introduced the notion of proxy signature and a lot of research work can be found on this topic nowadays. To simplify key management, many identity based proxy signature schemes were proposed. However, some existing schemes are vulnerable to proxy key exposure attack. It is necessary to propose a security model for identity based proxy signature schemes against proxy key exposure attack. Then an efficient scheme based on pairings was presented, which is provably secure in the random oracle model. In particular, the new scheme is secure against proxy key exposure attack

Key words: digital signature, proxy signature, identity based signature, bilinear pairing, random oracle model

CLC Number: